Jump to content

Advisories MDKSA-2006:214-1: Updated gv packages fix buffer overflow vulnerability


paul
 Share

Recommended Posts

Stack-based buffer overflow in the ps_gettext function in ps.c for GNU

gv 3.6.2, and possibly earlier versions, allows user-assisted attackers

to execute arbitrary code via a PostScript (PS) file with certain

headers that contain long comments, as demonstrated using the

DocumentMedia header.

 

Packages have been patched to correct this issue.

 

Update:

 

The patch used in the previous update still left the possibility of

causing X to consume unusual amounts of memory if gv is used to view a

carefully crafted image designed to exploit CVE-2006-5864. This update

uses an improved patch to address this issue.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...